Hi Everyone, I am always under the impression that one can NOT ping the outside interface of a Cisco PIX firewall unless the command is used:
conduit permit icmp any any conduit permit ip any any Well, I have a Cisco pix Firewall 515-UR model (96MB RAM/16MB Flash). This PIX firewall is running code version 6.0(1) with pdm version 1.11. Guess what, I can ping the outside interface just fine without the two commands mentioned above. Am I missing something? Below is the config: pixfirewall# wr t Building configuration... : Saved : PIX Version 6.0(1) nameif ethernet0 outside security0 nameif ethernet1 inside security100 nameif ethernet2 intf2 security10 enable password 8Ry2YjIyt7RRXU24 encrypted passwd 2KFQnbNIdI.2KYOU encrypted hostname pixfirewall fixup protocol ftp 21 fixup protocol http 80 fixup protocol h323 1720 fixup protocol rsh 514 fixup protocol smtp 25 fixup protocol sqlnet 1521 fixup protocol sip 5060 fixup protocol skinny 2000 names pager lines 24 interface ethernet0 auto interface ethernet1 auto interface ethernet2 auto shutdown mtu outside 1500 mtu inside 1500 mtu intf2 1500 ip address outside 172.16.1.73 255.255.255.0 ip address inside 192.168.1.73 255.255.255.0 ip address intf2 127.0.0.1 255.255.255.255 ip audit info action alarm ip audit attack action alarm no failover failover timeout 0:00:00 failover poll 15 failover ip address outside 0.0.0.0 failover ip address inside 0.0.0.0 failover ip address intf2 0.0.0.0 pdm history enable arp timeout 14400 static (inside,outside) 172.16.1.71 192.168.1.71 netmask 255.255.255.255 0 0 route outside 0.0.0.0 0.0.0.0 172.16.1.254 1 timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00 timeout uauth 0:05:00 absolute aaa-server TACACS+ protocol tacacs+ aaa-server RADIUS protocol radius no snmp-server location no snmp-server contact snmp-server community public no snmp-server enable traps floodguard enable no sysopt route dnat telnet timeout 5 ssh timeout 5 terminal width 80 : end pixfirewall(config)# sh ver Cisco Secure PIX Firewall Version 6.0(1) PIX Device Manager Version 1.1(1) Compiled on Thu 17-May-01 20:05 by morlee pixfirewall up 12 hours 18 mins Hardware: PIX-515, 96 MB RAM, CPU Pentium 200 MHz Flash i28F640J5 @ 0x300, 16MB BIOS Flash AT29C257 @ 0xfffd8000, 32KB 0: ethernet0: address is 0050.54ff.7a24, irq 10 1: ethernet1: address is 0050.54ff.7a25, irq 7 2: ethernet2: address is 00aa.00bc.ba87, irq 11 Licensed Features: Failover: Enabled VPN-DES: Enabled VPN-3DES: Disabled Maximum Interfaces: 6 Cut-through Proxy: Enabled Guards: Enabled Websense: Enabled Throughput: Unlimited ISAKMP peers: Unlimited [alam@linux-ccie]$ ping 172.16.1.73 PING 172.16.1.73 (172.16.1.73) from 172.16.1.253 : 56(84) bytes of data. Warning: time of day goes back, taking countermeasures. 64 bytes from 172.16.1.73: icmp_seq=0 ttl=255 time=962 usec 64 bytes from 172.16.1.73: icmp_seq=1 ttl=255 time=297 usec 64 bytes from 172.16.1.73: icmp_seq=2 ttl=255 time=288 usec --- 172.16.1.73 ping statistics --- 3 packets transmitted, 3 packets received, 0% packet loss round-trip min/avg/max/mdev = 0.288/0.515/0.962/0.316 ms [alam@linux-ccie]$ _________________________________________________________________ Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=26617&t=26617 -------------------------------------------------- FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

